If we returned a different response depending on if an email
existed in rubygems.org or not an attacker could use this
information to determine which email addresses were tied to
accounts on rubygems.org. They could possibly leverage this to take
control of an account and upload malicious gems.